Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM
383-4-270
Trusted RUBIX Version 5.0 Multilevel Security Relational Database Management System
CCEVS-VR-0079-2004
name Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM Trusted RUBIX Version 5.0 Multilevel Security Relational Database Management System
category Other Devices and Systems Databases
scheme CA US
not_valid_after 19.04.2018 06.09.2012
not_valid_before 16.07.2013 15.10.2004
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/belkin-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid1015-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/belkin-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid1015-st.pdf
manufacturer Belkin International, Inc. Infosystems Technology, Inc.
manufacturer_web https://www.belkin.com https://www.rubix.com/
security_level EAL4+, ALC_FLR.3 EAL4
dgst 40eda3a9b18267e3 35fa3a432cea789d
heuristics/cert_id 383-4-270 CCEVS-VR-0079-2004
heuristics/cert_lab CANADA US
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.2, AVA_MSU.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ADV_FSP.2, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1, ADV_IMP.1
heuristics/extracted_versions - 5.0
heuristics/scheme_data
  • category: DBMS
  • certification_date: 15.10.2004
  • evaluation_facility: COACT, Inc. Labs
  • expiration_date:
  • id: CCEVS-VR-VID1015
  • product: Trusted RUBIX Version 5.0 Multilevel Security Relational Database Management System
  • scheme: US
  • url: https://www.niap-ccevs.org/product/1015
  • vendor: Infosystems Technology, Inc.
heuristics/protection_profiles fd5d86dc01df0437 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf {}
pdf_data/report_filename belkin-cert-eng.pdf st_vid1015-vr.pdf
pdf_data/report_frontpage
  • US:
  • CA:
    • cert_id: 383-4-270 CR
    • cert_lab: CANADA
  • US:
    • cert_id: CCEVS-VR-04-0079
    • cert_item: Trusted RUBIX Version 5.0 Multilevel Security Relational Database Management System
    • cert_lab: US NIAP
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-270: 1
  • US:
    • CCEVS-VR-04-0079: 28
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 4+: 2
    • EAL4: 1
  • EAL:
    • EAL4: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 2
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.2: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 1
    • FAU_STG.1: 1
    • FAU_STG.4: 1
  • FDP:
    • FDP_ACC.2: 1
    • FDP_ACF.1: 1
    • FDP_ETC.1: 1
    • FDP_ETC.2: 1
    • FDP_IFC.2: 1
    • FDP_IFF.2: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ROL.2: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_REV.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_RCV.4: 1
    • FPT_SEP: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.DISASTER: 1
    • A.PHYSICAL: 1
    • A.SECURE_COMMS: 1
    • A.USERS: 1
  • T:
    • T.ABUSE: 1
    • T.ADMIN_ERROR: 1
    • T.ADMIN_ROGUE: 1
    • T.AUDIT_CORRUPT: 1
    • T.DOS: 1
    • T.EAVESDROP: 1
    • T.EXPORT: 1
    • T.IMPROPER_INSTALLATION: 1
    • T.INSECURE_START: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.REPLAY: 1
    • T.SPOOFING: 1
    • T.SYSACC: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNAUTH_ACCESS: 1
    • T.UNAUTH_MODIFICATION: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.UNIDENTIFIED_ACTIONS: 1
    • T.UNKNOWN_STATE: 1
    • T.USER_CORRUPT: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /Author: User
  • /CCEF: CCEF name
  • /CR date: dd month yyyy
  • /CR version: x.x
  • /Certificate date: dd month yyyy
  • /Comments:
  • /Company:
  • /CreationDate: D:20131004084035-04'00'
  • /Creator: Acrobat PDFMaker 10.0 for Word
  • /Developer name: Developer name
  • /Document number: 383-4-xx-CR
  • /ETR title, version, date: ETR title, version, date
  • /Evaluation completion date: dd month yyyy
  • /Manager:
  • /ModDate: D:20131004084142-04'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /ST Title: ST title
  • /ST date: dd month yyyy
  • /ST version: ST version
  • /Sponsor: Sponsor
  • /Subject:
  • /TOE Version: 5.0
  • /TOE name and version: TOE name and version
  • /TOE short name: TOE short name
  • /Title: EAL 4+ Evaluation of Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM
  • pdf_file_size_bytes: 64923
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename belkin-sec-eng.pdf st_vid1015-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 4: 68
    • EAL 4 augmented: 65
    • EAL4: 1
  • EAL:
    • EAL4: 9
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 2
    • ALC_FLR.3: 71
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ACM:
    • ACM_AUT.1: 14
    • ACM_CAP: 1
    • ACM_CAP.3: 1
    • ACM_CAP.4: 22
    • ACM_SCP: 1
    • ACM_SCP.2: 9
  • ADO:
    • ADO_DEL.2: 13
    • ADO_IGS.1: 11
  • ADV:
    • ADV_FSP.1: 7
    • ADV_FSP.2: 14
    • ADV_HLD.1: 2
    • ADV_HLD.2: 19
    • ADV_IMP.1: 12
    • ADV_LLD.1: 21
    • ADV_RCR.1: 12
    • ADV_SPM.1: 17
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 20
    • AGD_USR.1: 18
  • ALC:
    • ALC_DVS.1: 11
    • ALC_LCD.1: 11
    • ALC_TAT.1: 14
  • ATE:
    • ATE_COV.2: 11
    • ATE_DPT.1: 9
    • ATE_FUN.1: 17
    • ATE_IND.2: 9
  • AVA:
    • AVA_MSU.2: 17
    • AVA_SOF.1: 11
    • AVA_VLA.2: 12
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 5
    • FDP_ETC: 1
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 33
    • FDP_IFC.1: 6
    • FDP_IFF: 27
    • FDP_IFF.1: 12
    • FDP_ITC: 1
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA: 4
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 3
    • FMT_SMR.1: 3
  • FPT:
    • FPT_PHP: 2
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
  • FAU:
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.2: 8
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 9
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 10
    • FAU_STG.4: 8
  • FDP:
    • FDP_ACC.1: 6
    • FDP_ACC.1.1: 1
    • FDP_ACC.2: 11
    • FDP_ACC.2.1: 9
    • FDP_ACC.2.2: 8
    • FDP_ACF.1: 21
    • FDP_ACF.1.2: 12
    • FDP_ACF.1.3: 12
    • FDP_ACF.1.4: 12
    • FDP_ETC.1: 11
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 8
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFC.2: 10
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_IFF.2: 8
    • FDP_IFF.2.1: 1
    • FDP_IFF.2.2: 4
    • FDP_IFF.2.3: 2
    • FDP_IFF.2.4: 1
    • FDP_IFF.2.5: 2
    • FDP_IFF.2.6: 1
    • FDP_IFF.2.7: 3
    • FDP_ITC.1: 11
    • FDP_ITC.1.1: 2
    • FDP_ITC.1.2: 2
    • FDP_ITC.1.3: 2
    • FDP_ITC.2: 13
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_ITT.1: 5
    • FDP_ITT.1.1: 1
    • FDP_ROL.2: 10
    • FDP_ROL.2.1: 2
    • FDP_ROL.2.2: 2
  • FIA:
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 2
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 16
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 3
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 4
    • FMT_MSA.2: 7
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 5
    • FMT_REV.1: 8
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 3
    • FPT_AMT.1.1: 1
    • FPT_ITT.1: 3
    • FPT_ITT.1.1: 1
    • FPT_RCV: 3
    • FPT_RCV.2: 2
    • FPT_RCV.4: 13
    • FPT_RCV.4.1: 1
    • FPT_STM.1: 6
    • FPT_TDC.1: 4
    • FPT_TST.1: 2
  • FTP:
    • FTP_ITC.1: 3
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.MANAGE: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 2
  • O:
    • O.CONF: 7
    • O.INDICATE: 3
    • O.ROM: 11
    • O.SELECT: 3
    • O.SWITCH: 7
    • O.TAMPER: 6
    • O.UNIDIR: 11
    • O.USBDETECT: 6
  • OE:
    • OE.ACCESS: 3
    • OE.MANAGE: 2
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 2
  • T:
    • T.INFECTED: 3
    • T.INVALIDUSB: 3
    • T.PERIP: 3
    • T.RESIDUAL: 3
    • T.ROM_PROG: 3
    • T.SPOOF: 3
    • T.TAMPER: 3
    • T.TRANSFER: 3
  • A:
    • A.ADMIN: 4
    • A.DISASTER: 4
    • A.PHYSICAL: 4
    • A.SECURE_COMMS: 4
    • A.USERS: 4
  • O:
    • O.ENV: 1
    • O.ENV_ADMIN: 34
    • O.ENV_CONFIG: 19
    • O.ENV_DISASTER: 3
    • O.ENV_PHYSICAL: 13
    • O.ENV_SECURE_COMMS: 11
    • O.ENV_TRUST_IT: 30
    • O.ENV_USERS: 15
    • O.IT_ENV: 1
    • O.IT_ENV_: 2
    • O.IT_ENV_AUDIT_PROTECTION: 1
    • O.IT_ENV_SELF_PROTECTION: 1
    • O.IT_ENV_TIME: 10
    • O.IT_ENV_USER_IDENTIFICATION: 1
    • O.TOE: 1
    • O.TOE_ADMIN_GUIDANCE: 21
    • O.TOE_ADMIN_ROLE: 5
    • O.TOE_AUDIT_GENERATION: 9
    • O.TOE_AUDIT_PROTECTION: 6
    • O.TOE_AUDIT_REVIEW: 3
    • O.TOE_DEVEL_CM: 7
    • O.TOE_DISCRETIONARY_ACCESS: 8
    • O.TOE_MANDATORY_ACCESS: 7
    • O.TOE_RECOVERY: 2
    • O.TOE_RESIDUAL_INFORMATION: 2
    • O.TOE_SELF_PROTECTION: 4
    • O.TOE_SOUND_DEVELOPMENT: 10
    • O.TOE_TESTING: 5
    • O.TOE_USER_GUIDANCE: 14
    • O.TOE_USER_IDENTIFICATION: 2
  • T:
    • T.ABUSE: 9
    • T.AUDIT_CORRUPT: 1
    • T.EXPORT: 5
    • T.POOR_: 1
    • T.USER_CORRUPT: 1
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Microsoft:
    • Microsoft: 4
  • Samsung:
    • Samsung: 3
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 76
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 10
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
pdf_data/st_metadata
  • /Author: krshann
  • /CreationDate: D:20130909140137-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20130910104630-04'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - Belkin Secure DVI KVM Switch ST Rev 1_01 updated by keith.docx
  • pdf_file_size_bytes: 739602
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
  • /Author: Tom2
  • /CreationDate: D:20041102085934-05'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20041118074805-05'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: Microsoft Word - ST_Trusted_RUBIX_v1.4.8.doc
  • pdf_file_size_bytes: 534415
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 183
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different