Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F)
CCEVS-VR-VID-10455-2011
Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12
ANSSI-CC-2016/06
name Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F) Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
not_valid_after 14.05.2015 26.02.2021
not_valid_before 01.08.2011 26.02.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-06.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2016-06.pdf
manufacturer Belkin International, Inc. Gemalto - Infineon Technologies AG
manufacturer_web https://www.belkin.com https://www.gemalto.com/
security_level EAL2+, ALC_FLR.3 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst 29a987839a62165e 832bbe4dde3c99d0
heuristics/cert_id CCEVS-VR-VID-10455-2011 ANSSI-CC-2016/06
heuristics/cert_lab US SERMA
heuristics/extracted_sars ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ALC_FLR.3, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1 ALC_DVS.2, AVA_VAN.5
heuristics/extracted_versions - 1.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2016/24
heuristics/report_references/directly_referencing {} ANSSI-CC-2015/73
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2016/24
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0926-2014, ANSSI-CC-2015/73, BSI-DSZ-CC-0907-2013
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 01.08.2011
  • evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
  • expiration_date: 14.05.2015
  • id: CCEVS-VR-VID10455
  • product: Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10455
  • vendor: Belkin International, Inc.
heuristics/protection_profiles fd5d86dc01df0437 85bef5b6f16c4d33
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf
pdf_data/report_filename st_vid10455-vr.pdf ANSSI-CC-2016-06.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID10455-2011
    • cert_item: Belkin® Secure DVI-I KVM Switch
    • cert_lab: US NIAP
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2016/06
    • cert_item: Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12
    • cert_item_version: Version 1.0
    • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Java Card System Protection Profile – Open Configuration [PP-JCS Open Configuration], version 3.0
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10455-2011: 1
  • FR:
    • ANSSI-CC-2015/73: 1
    • ANSSI-CC-2016/06: 22
  • NL:
    • CC-0964-2015: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 8
    • EAL 2 augmented: 2
    • EAL 4: 1
    • EAL2: 5
    • EAL2 augmented: 4
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 7
  • ATE:
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • T:
    • T.INVALIDUSB: 1
    • T.PHYSICAL: 1
    • T.RESIDUAL: 1
    • T.ROM_PROG: 1
    • T.SPOOF: 1
    • T.STATE: 1
    • T.TRANSFER: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 3
  • Infineon:
    • Infineon: 27
    • Infineon Technologies: 1
pdf_data/report_keywords/eval_facility
  • Serma:
    • SERMA: 1
    • Serma Safety & Security: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_metadata
  • /Author: Jonathan Gimenez
  • /CreationDate: D:20160226154150+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.017
  • /ModDate: D:20160226154150+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12
  • /Title: ANSSI-CC-2016/06
  • pdf_file_size_bytes: 796998
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename st_vid10455-st.pdf cible2016-06.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0917-: 1
  • FR:
    • ANSSI-CC-PP-2010/03-M01: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071: 1
    • BSI-CC-PP-0072: 1
    • BSI-CC-PP-0075: 1
    • BSI-CC-PP-0076: 1
    • BSI-PP-0035: 1
  • other:
    • PP-SSCD-: 1
    • PP-SSCD-P2: 1
    • PP-SSCD-P3: 1
    • PP-SSCD-P4: 1
    • PP-SSCD-P5: 1
    • PP-SSCD-P6: 1
    • PP-SSCD-T2: 1
    • PP-SSCD-T3: 1
    • PP-SSCD-T5: 1
    • PP-SSCD-T6: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 3
    • EAL2 augmented: 2
  • EAL:
    • EAL 5+: 1
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
    • ALC_FLR.3: 5
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_IFC: 2
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF: 3
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITC.1: 1
  • FMT:
    • FMT_MSA: 3
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 3
  • FPT:
    • FPT_PHP: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
  • FAU:
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
  • FCO:
    • FCO_NRO: 2
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 2
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
    • FCS_RND: 7
    • FCS_RND.1: 7
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 14
    • FDP_ACC.1: 1
    • FDP_ACC.2: 6
    • FDP_ACF: 16
    • FDP_ACF.1: 13
    • FDP_IFC: 4
    • FDP_IFC.1: 1
    • FDP_IFC.2: 2
    • FDP_IFF: 4
    • FDP_IFF.1: 10
    • FDP_ITC: 4
    • FDP_ITC.2: 5
    • FDP_RIP: 17
    • FDP_RIP.1: 8
    • FDP_ROL: 6
    • FDP_ROL.1: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 2
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 3
    • FIA_ATD.1: 1
    • FIA_SOS.2: 1
    • FIA_UAI.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 1
    • FIA_UID: 4
    • FIA_UID.1: 2
    • FIA_UID.2: 1
    • FIA_USB: 2
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 5
    • FMT_MSA.2: 1
    • FMT_MSA.3: 10
    • FMT_MTD: 4
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 6
    • FMT_SMF.1: 3
    • FMT_SMR: 9
    • FMT_SMR.1: 8
  • FPR:
    • FPR_UNO: 2
    • FPR_UNO.1: 3
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 10
    • FPT_FLS.1: 5
    • FPT_ITT: 2
    • FPT_ITT.1: 1
    • FPT_PHP: 2
    • FPT_PHP.3: 1
    • FPT_RCV: 4
    • FPT_RCV.3: 4
    • FPT_RCV.4: 1
    • FPT_TDC.1: 2
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 2
    • FPT_TST.1: 3
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 2
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
  • O:
    • O.CONF: 7
    • O.INDICATE: 3
    • O.ROM: 5
    • O.SELECT: 4
    • O.SWITCH: 5
    • O.TAMPER: 3
    • O.USBDETECT: 6
  • OE:
    • OE.ACCESS: 2
    • OE.MANAGE: 2
    • OE.NOEVIL: 2
    • OE.PHYSICAL: 2
  • T:
    • T.INVALIDUSB: 3
    • T.PHYSICAL: 3
    • T.RESIDUAL: 3
    • T.ROM_PROG: 3
    • T.SPOOF: 3
    • T.STATE: 3
    • T.TRANSFER: 3
  • A:
    • A.APPLET: 4
    • A.DELETION: 5
    • A.VERIFICATION: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 11
    • O.APPLET: 28
    • O.CARD-MANAGEMENT: 2
    • O.CARD_MANAGEMENT: 14
    • O.CIPHER: 5
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 4
    • O.FIREWALL: 11
    • O.GLOBAL_ARRAYS_CONFID: 5
    • O.GLOBAL_ARRAYS_INTEG: 4
    • O.INSTALL: 7
    • O.JAVAOBJECT: 56
    • O.KEY-: 1
    • O.KEY-MNGT: 4
    • O.KEY_MNGT: 1
    • O.LOAD: 5
    • O.NATIVE: 7
    • O.OBJ-DELETION: 3
    • O.OPERATE: 14
    • O.PIN-: 1
    • O.PIN-MNGT: 4
    • O.REALLOCATION: 4
    • O.RESOURCES: 5
    • O.RND: 7
    • O.SCP: 21
    • O.SID: 9
    • O.TRANSACTION: 5
  • OE:
    • OE.APPLET: 3
    • OE.APPS-VALIDATION: 1
    • OE.CODE-EVIDENCE: 10
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.RND: 3
    • OSP.RNG: 1
    • OSP.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 3
    • T.EXE-CODE: 8
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RESOURCES: 3
    • T.SID: 8
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Samsung:
    • Samsung: 3
  • Gemalto:
    • Gemalto: 520
  • Infineon:
    • Infineon: 5
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 7
    • DES:
      • DES: 14
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • DH: 10
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 1
    • SHA2:
      • SHA-224: 3
      • SHA-256: 3
      • SHA224: 2
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 11
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 10
    • RNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 9
  • FI:
    • Malfunction: 3
    • fault induction: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 3
    • physical probing: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 3
  • PKCS:
    • PKCS#1: 8
    • PKCS#3: 1
    • PKCS#5: 3
  • SCP:
    • SCP01: 3
    • SCP02: 3
    • SCP03: 3
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.4: 7
    • JavaCard 3.0: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: seckgren
  • /CreationDate: D:20110822114124-07'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20110822114124-07'00'
  • /Producer: Acrobat Distiller 9.4.5 (Windows)
  • /Title: Microsoft Word - 01g - Belkin_2098_ST_Clean.doc
  • pdf_file_size_bytes: 197617
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /Author: Antoine de Lavernette
  • /CreationDate: D:20150908153505+02'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: Security Target, CC
  • /ModDate: D:20150908153505+02'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: Security Target
  • /Title: eTravel v1.0 Security Target MAÏA3
  • pdf_file_size_bytes: 1662139
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 83
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different