This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F) CCEVS-VR-VID-10455-2011 |
KYOCERA ECOSYS PA6000x, PA5500x, PA5000x, PA4500x, P40050x, P40045x,TA Triumph Adler P-6034DN, P-5534DN, P-5034DN, P-4534DN,UTAX P-6034DN, P-5534DN, P-5034DN, P-4534DN,with system firmware C0T_S0IS.C04.002 CSEC2022012 |
|
---|---|---|
name | Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F) | KYOCERA ECOSYS PA6000x, PA5500x, PA5000x, PA4500x, P40050x, P40045x,TA Triumph Adler P-6034DN, P-5534DN, P-5034DN, P-4534DN,UTAX P-6034DN, P-5534DN, P-5034DN, P-4534DN,with system firmware C0T_S0IS.C04.002 |
category | Network and Network-Related Devices and Systems | Multi-Function Devices |
scheme | US | SE |
status | archived | active |
not_valid_after | 14.05.2015 | 22.06.2028 |
not_valid_before | 01.08.2011 | 22.06.2023 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA_PA6000.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Kyocera%20ECOSYS%20PA6000x,%20PA5500x,%20PA5000x,%20PA4500x_1-0_22FMV6373-24.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_ECOSYS_PA6000x_V100.pdf |
manufacturer | Belkin International, Inc. | KYOCERA Document Solutions Inc. |
manufacturer_web | https://www.belkin.com | https://www.kyoceradocumentsolutions.com/ |
security_level | EAL2+, ALC_FLR.3 | EAL2+, ALC_FLR.2 |
dgst | 29a987839a62165e | c86377c480aedc8d |
heuristics/cert_id | CCEVS-VR-VID-10455-2011 | CSEC2022012 |
heuristics/cert_lab | US | [] |
heuristics/extracted_sars | ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ALC_FLR.3, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1 | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions | - | 04.002 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | fd5d86dc01df0437 | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf | {} |
pdf_data/cert_filename | CCRA_PA6000.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid10455-vr.pdf | Certification Report - Kyocera ECOSYS PA6000x, PA5500x, PA5000x, PA4500x_1-0_22FMV6373-24.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid10455-st.pdf | ST_ECOSYS_PA6000x_V100.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | False | True |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |