Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F)
CCEVS-VR-VID-10455-2011
genuscreen 5.0
BSI-DSZ-CC-0966-2015
name Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F) genuscreen 5.0
category Network and Network-Related Devices and Systems Boundary Protection Devices and Systems
scheme US DE
not_valid_after 14.05.2015 03.12.2020
not_valid_before 01.08.2011 03.12.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0966a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0966b_pdf.pdf
manufacturer Belkin International, Inc. GeNUA mbH
manufacturer_web https://www.belkin.com https://www.genua.de/
security_level EAL2+, ALC_FLR.3 ASE_TSS.2, AVA_VAN.4, ALC_FLR.2, EAL4+
dgst 29a987839a62165e f5889e9d79b1762e
heuristics/cert_id CCEVS-VR-VID-10455-2011 BSI-DSZ-CC-0966-2015
heuristics/cert_lab US BSI
heuristics/extracted_sars ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ALC_FLR.3, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, AVA_VAN.4, ADV_TAT.1, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions - 5.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0823-2014
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0382-2007, BSI-DSZ-CC-0565-2009, BSI-DSZ-CC-0823-2014
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 01.08.2011
  • evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
  • expiration_date: 14.05.2015
  • id: CCEVS-VR-VID10455
  • product: Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10455
  • vendor: Belkin International, Inc.
heuristics/protection_profiles fd5d86dc01df0437 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf {}
pdf_data/report_filename st_vid10455-vr.pdf 0966a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10455-2011
    • cert_item: Belkin® Secure DVI-I KVM Switch
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 extended EAL 4 augmented by ALC_FLR.2, ASE_TSS.2 and AVA_VAN.4 SOGIS Recognition Agreement for components up to EAL 4
    • cc_version: Product specific Security Target Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0966-2015
    • cert_item: genuscreen 5.0
    • cert_lab: BSI
    • developer: genua gmbh
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10455-2011: 1
  • DE:
    • BSI-DSZ-CC-0823-2014: 3
    • BSI-DSZ-CC-0966: 1
    • BSI-DSZ-CC-0966-2015: 18
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 8
    • EAL 2 augmented: 2
    • EAL 4: 1
    • EAL2: 5
    • EAL2 augmented: 4
  • EAL:
    • EAL 1: 7
    • EAL 2: 5
    • EAL 3: 4
    • EAL 4: 16
    • EAL 4 augmented: 3
    • EAL 5: 9
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 7
  • ATE:
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 6
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 6
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RNG: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • T:
    • T.INVALIDUSB: 1
    • T.PHYSICAL: 1
    • T.RESIDUAL: 1
    • T.ROM_PROG: 1
    • T.SPOOF: 1
    • T.STATE: 1
    • T.TRANSFER: 1
  • A:
    • A.ADMIN: 3
    • A.HANET: 3
    • A.INIT: 3
    • A.NOEVIL: 3
    • A.PHYSEC: 4
    • A.SINGEN: 3
    • A.TIMESTMP: 2
  • OE:
    • OE.ADMIN: 1
    • OE.HANET: 1
    • OE.INIT: 1
    • OE.NOEVIL: 1
    • OE.PHYSEC: 1
    • OE.SINGEN: 1
    • OE.TIMESTMP: 1
pdf_data/report_keywords/eval_facility
  • secuvera:
    • secuvera: 3
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 2
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 9
  • SSH:
    • SSH: 15
  • VPN:
    • VPN: 6
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • BSI:
    • AIS 20: 2
    • AIS 34: 1
    • AIS 38: 1
    • AIS20: 3
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Evaluation Technical Report BSI-DSZ-CC-0966 for genuscreen 5.0 from genua gmbh of secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • OutOfScope:
    • The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a: 1
    • or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6: 1
    • out of scope: 2
pdf_data/report_metadata
pdf_data/st_filename st_vid10455-st.pdf 0966b_pdf.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 3
    • EAL2 augmented: 2
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
    • ALC_FLR.3: 5
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 4
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_IMP: 1
    • ADV_IMP.1: 3
    • ADV_INT: 2
    • ADV_SPM: 2
    • ADV_TAT.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 3
    • AGD_PRE: 1
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_FLR: 1
    • ALC_FLR.2: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 2
    • ALC_TAT: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 3
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 1
    • ASE_REQ.1: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 4
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 2
    • ATE_FUN: 1
    • ATE_FUN.1: 4
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.4: 4
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_IFC: 2
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF: 3
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITC.1: 1
  • FMT:
    • FMT_MSA: 3
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 3
  • FPT:
    • FPT_PHP: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
  • FAU:
    • FAU_GEN: 20
    • FAU_GEN.1: 5
    • FAU_GEN.2: 1
    • FAU_SAR: 12
    • FAU_SAR.1: 3
    • FAU_SAR.3: 1
  • FCS:
    • FCS_CKM: 143
    • FCS_CKM.1: 29
    • FCS_CKM.4: 31
    • FCS_COP: 100
    • FCS_COP.1: 29
    • FCS_RNG: 1
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_IFC: 53
    • FDP_IFC.1: 33
    • FDP_IFF: 43
    • FDP_IFF.1: 37
    • FDP_ITT: 32
    • FDP_ITT.1: 4
  • FIA:
    • FIA_ATD: 6
    • FIA_ATD.1: 1
    • FIA_SOS: 6
    • FIA_SOS.1: 1
    • FIA_UAU: 12
    • FIA_UAU.2: 1
    • FIA_UAU.6: 1
    • FIA_UID: 6
    • FIA_UID.1: 3
    • FIA_UID.2: 2
  • FMT:
    • FMT_IFC.2: 2
    • FMT_MOF: 6
    • FMT_MOF.1: 1
    • FMT_MSA: 166
    • FMT_MSA.1: 26
    • FMT_MSA.2: 4
    • FMT_MSA.3: 18
    • FMT_SMF: 49
    • FMT_SMF.1: 22
    • FMT_SMR: 8
    • FMT_SMR.1: 26
  • FPT:
    • FPT_ITT: 8
    • FPT_ITT.1: 3
    • FPT_STM.1: 3
    • FPT_TEE: 8
    • FPT_TEE.1: 2
    • FPT_TRC: 6
    • FPT_TRC.1: 1
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTP:
    • FTP_STM.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 2
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
  • O:
    • O.CONF: 7
    • O.INDICATE: 3
    • O.ROM: 5
    • O.SELECT: 4
    • O.SWITCH: 5
    • O.TAMPER: 3
    • O.USBDETECT: 6
  • OE:
    • OE.ACCESS: 2
    • OE.MANAGE: 2
    • OE.NOEVIL: 2
    • OE.PHYSICAL: 2
  • T:
    • T.INVALIDUSB: 3
    • T.PHYSICAL: 3
    • T.RESIDUAL: 3
    • T.ROM_PROG: 3
    • T.SPOOF: 3
    • T.STATE: 3
    • T.TRANSFER: 3
  • A:
    • A.ADMIN: 4
    • A.HANET: 5
    • A.INIT: 4
    • A.NOEVIL: 4
    • A.PHYSEC: 4
    • A.SINGEN: 5
    • A.TIMESTMP: 4
  • O:
    • O.AUDREC: 5
    • O.AUTH: 11
    • O.AVAIL: 5
    • O.CONFID: 12
    • O.INTEG: 9
    • O.MEDIAT: 4
    • O.NOREPLAY: 12
    • O.RS: 10
  • OE:
    • OE.ADMIN: 2
    • OE.HANET: 6
    • OE.INIT: 7
    • OE.NOEVIL: 3
    • OE.PHYSEC: 4
    • OE.SINGEN: 4
    • OE.TIMESTMP: 5
  • T:
    • T.MEDIAT: 4
    • T.MMODIFY: 4
    • T.MODIFY: 4
    • T.MSNIFF: 4
    • T.NOAUTH: 4
    • T.SELPRO: 4
    • T.SNIFF: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Samsung:
    • Samsung: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
  • constructions:
    • MAC:
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 2
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-256: 1
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 2
  • KEX:
    • Key Exchange: 4
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 90
    • IKEv1: 3
  • IPsec:
    • IPsec: 34
  • SSH:
    • SSH: 137
  • VPN:
    • VPN: 17
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CTR:
    • CTR: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 9
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 3
    • AIS31: 2
  • FIPS:
    • FIPS180-4: 2
  • PKCS:
    • PKCS #1: 7
    • PKCS#1: 6
  • RFC:
    • RFC2104: 7
    • RFC2409: 9
    • RFC2460: 2
    • RFC2617: 1
    • RFC2965: 1
    • RFC3502: 1
    • RFC3526: 5
    • RFC3602: 1
    • RFC4253: 6
    • RFC4301: 1
    • RFC4344: 1
    • RFC4418: 7
    • RFC4432: 1
    • RFC5639: 6
    • RFC5656: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1.4.8.7 No Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware: 1
    • out of scope: 4
    • the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and: 1
    • to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration: 1
    • when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP: 1
pdf_data/st_metadata
  • /Author: seckgren
  • /CreationDate: D:20110822114124-07'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20110822114124-07'00'
  • /Producer: Acrobat Distiller 9.4.5 (Windows)
  • /Title: Microsoft Word - 01g - Belkin_2098_ST_Clean.doc
  • pdf_file_size_bytes: 197617
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /Author: Roland Meister
  • /CreationDate: D:20150814121632+02'00'
  • /Creator: Writer
  • /Keywords: CC 3.1
  • /Producer: LibreOffice 4.1
  • /Subject: Common Criteria
  • /Title: genucreen 5.0 Security Target
  • pdf_file_size_bytes: 802825
  • pdf_hyperlinks: http://www.ecc-brainpool.org/download/Domain-parameters.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different