Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM
383-4-270
McAfee Endpoint Encryption for PC v5.2.6 with McAfee Endpoint Encryption Manager v5.2.6
CCEVS-VR-VID-10400-2011
name Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM McAfee Endpoint Encryption for PC v5.2.6 with McAfee Endpoint Encryption Manager v5.2.6
category Other Devices and Systems Data Protection
scheme CA US
not_valid_after 19.04.2018 01.11.2014
not_valid_before 16.07.2013 17.10.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/belkin-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10400-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/belkin-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10400-st.pdf
manufacturer Belkin International, Inc. McAfee, Inc.
manufacturer_web https://www.belkin.com https://www.mcafee.com/
dgst 40eda3a9b18267e3 ee66687b54d71ea5
heuristics/cert_id 383-4-270 CCEVS-VR-VID-10400-2011
heuristics/cert_lab CANADA US
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ATE_DPT.2, ALC_CMS.4, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, ADV_FSP.4, ATE_IND.2, ALC_LCD.1, ADV_ARC.1, ALC_FLR.3, ADV_TDS.3, AGD_OPE.1, AVA_VAN.3, ADV_IMP.1
heuristics/extracted_versions - 5.2.6
heuristics/scheme_data
  • category: Sensitive Data Protection
  • certification_date: 04.10.2011
  • evaluation_facility: COACT, Inc. Labs
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10400
  • product: McAfee Endpoint Encryption for PC v5.2.6 with McAfee Endpoint Encryption Manager v5.2.6
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10400
  • vendor: McAfee, LLC
heuristics/protection_profiles fd5d86dc01df0437 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf {}
pdf_data/report_filename belkin-cert-eng.pdf st_vid10400-vr.pdf
pdf_data/report_frontpage
  • US:
  • CA:
    • cert_id: 383-4-270 CR
    • cert_lab: CANADA
  • US:
    • cert_id: CCEVS-VR-VID10400-2011
    • cert_item: McAfee Endpoint Encryption for PC version 5.2.6 with McAfee Endpoint Encryption Manager version 5.2.6
    • cert_lab: US NIAP
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-270: 1
  • US:
    • CCEVS-VR-VID10400-2011: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 4+: 2
    • EAL4: 1
  • EAL:
    • EAL 4: 7
    • EAL 4 augmented: 1
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 2
  • ALC:
    • ALC_FLR.3: 4
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 7
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /Author: User
  • /CCEF: CCEF name
  • /CR date: dd month yyyy
  • /CR version: x.x
  • /Certificate date: dd month yyyy
  • /Comments:
  • /Company:
  • /CreationDate: D:20131004084035-04'00'
  • /Creator: Acrobat PDFMaker 10.0 for Word
  • /Developer name: Developer name
  • /Document number: 383-4-xx-CR
  • /ETR title, version, date: ETR title, version, date
  • /Evaluation completion date: dd month yyyy
  • /Manager:
  • /ModDate: D:20131004084142-04'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /ST Title: ST title
  • /ST date: dd month yyyy
  • /ST version: ST version
  • /Sponsor: Sponsor
  • /Subject:
  • /TOE Version: 5.0
  • /TOE name and version: TOE name and version
  • /TOE short name: TOE short name
  • /Title: EAL 4+ Evaluation of Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM
  • pdf_file_size_bytes: 64923
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename belkin-sec-eng.pdf st_vid10400-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 4: 68
    • EAL 4 augmented: 65
    • EAL4: 1
  • EAL:
    • EAL4: 2
    • EAL4+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 2
    • ALC_FLR.3: 71
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 14
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 4
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 5
    • FDP_ETC: 1
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 33
    • FDP_IFC.1: 6
    • FDP_IFF: 27
    • FDP_IFF.1: 12
    • FDP_ITC: 1
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA: 4
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 3
    • FMT_SMR.1: 3
  • FPT:
    • FPT_PHP: 2
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
  • FAU:
    • FAU_GEN.1: 22
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 13
    • FAU_GEN.2.1: 2
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 13
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
    • FAU_STG.3: 13
    • FAU_STG.3.1: 2
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 10
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 31
    • FCS_COP.1.1: 4
  • FDP:
    • FDP_ACC.2: 11
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 13
    • FIA_UAU.2.1: 2
    • FIA_UAU.4: 23
    • FIA_UAU.4.1: 2
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 2
    • FIA_UID.2: 13
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 28
    • FMT_MTD.1.1: 4
    • FMT_MTD.2: 6
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_REV.1: 13
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SAE.1: 13
    • FMT_SAE.1.1: 2
    • FMT_SAE.1.2: 2
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_RCV.1: 5
    • FPT_RCV.1.1: 1
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
  • FRU:
    • FRU_FLT.1: 5
    • FRU_FLT.1.1: 1
  • FTA:
    • FTA_SSL.2: 5
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.MANAGE: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 2
  • O:
    • O.CONF: 7
    • O.INDICATE: 3
    • O.ROM: 11
    • O.SELECT: 3
    • O.SWITCH: 7
    • O.TAMPER: 6
    • O.UNIDIR: 11
    • O.USBDETECT: 6
  • OE:
    • OE.ACCESS: 3
    • OE.MANAGE: 2
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 2
  • T:
    • T.INFECTED: 3
    • T.INVALIDUSB: 3
    • T.PERIP: 3
    • T.RESIDUAL: 3
    • T.ROM_PROG: 3
    • T.SPOOF: 3
    • T.TAMPER: 3
    • T.TRANSFER: 3
  • A:
    • A.AUTHENTICATION_DATA_PRIVATE: 5
    • A.AVAILABLE_BACKUP: 4
    • A.DOMAIN_SEPARATION: 4
    • A.MANAGEMENT: 5
    • A.NON_TECHNICAL_IDENTITY_VERIFICATION: 5
    • A.NO_MALEVOLENCE: 3
    • A.PROFICIENT_USERS: 6
    • A.SECURE_BACKUP: 4
    • A.TIME_SOURCE: 5
    • A.TRUSTED_SOFTWARE: 4
  • O:
    • O.ACCESS_CONTROL: 9
    • O.AUDIT: 14
    • O.AUTHORISATION: 18
    • O.AUTHORISED: 1
    • O.CRYPOTOGRAPHIC_KEYS: 3
    • O.CRYPTOGRAPHIC_KEYS: 8
    • O.CRYPTOGRAPHIC_OPERATIONS: 9
    • O.DATA_TRANSFER: 9
    • O.EASE_OF_USE_USER: 7
    • O.EFFECTIVE_ADMINISTRATION: 8
    • O.ENCRYPTED_MEDIA: 9
    • O.FAULT_TOLERANCE: 7
    • O.NO_OBJECT_REUSE: 9
    • O.PROTECT: 9
    • O.SECURE_RECOVERY: 7
    • O.TRUSTED_PATH: 9
    • O.UNATHORISED_MODIFICATION: 1
  • OE:
    • OE.AUTH: 6
    • OE.AVAILABLE_BACKUP: 6
    • OE.DOMAIN_SEPARATION: 4
    • OE.EASE_OF_USE_ADMIN: 8
    • OE.EASE_OF_USE_USER: 6
    • OE.MANAGED: 10
    • OE.NON_TECHNICAL_IDENTITY_VERIFICATION: 6
    • OE.SECURE_BACKUP: 6
    • OE.TIME_SOURCE: 9
    • OE.TRUSTED_SOFTWARE: 4
  • T:
    • T.ACCESS: 9
    • T.ALTERNATE_BOOT_PROCESS: 4
    • T.CONFIG: 3
    • T.CONFIG_MODIFICATION: 1
    • T.CORRUPT_AUDIT: 5
    • T.EASE_OF_USE_ADMIN: 4
    • T.EASE_OF_USE_USER: 4
    • T.EAVESDROP_TRANSIT: 4
    • T.OBJECT_REUSE: 5
    • T.PASSWORD_LOSS: 6
    • T.RECORD_ACTIONS: 7
    • T.RECOVERY_MASQUERADE: 5
    • T.RECOVERY_PROCEDURE_INTERCEPT: 3
    • T.REMOVE_DISK: 3
    • T.SPOOF: 5
    • T.SYSTEM_ACCESS: 9
    • T.UNAUTHORISED_MODIFICATION: 9
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Microsoft:
    • Microsoft: 4
  • Samsung:
    • Samsung: 3
  • Microsoft:
    • Microsoft: 12
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 31
      • AES-256: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 9
    • DSA:
      • DSA: 19
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 13
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 3
  • RNG:
    • RNG: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 10
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 186-2: 5
    • FIPS 197: 4
  • RFC:
    • RFC 2631: 2
    • RFC 2898: 3
pdf_data/st_metadata
  • /Author: krshann
  • /CreationDate: D:20130909140137-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20130910104630-04'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - Belkin Secure DVI KVM Switch ST Rev 1_01 updated by keith.docx
  • pdf_file_size_bytes: 739602
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
  • /Author: Alan Gornall
  • /CreationDate: D:20111028152413
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20111028152413
  • /Producer: Microsoft® Office Word 2007
  • /Title: 1
  • pdf_file_size_bytes: 736993
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 60
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different